Explain how an email containing HTML with embedded scripts is a risk to security.

Explain how cookies are used by both the web browser and the webserver.

Explain how reflection, injection attack, and cross-site scripting work and why they may fail.

Analyze scenarios involving the web in terms of services, risk, security and forensics.

Relate to other network services an understanding of the web as a client-server based network service.

Networks

Explain the basic functioning of the Internet in terms of hosts, packets, routers and IP addresses.

List the layers in the protocol stack of the TCP/IP Model. Describe each layer in terms of
its function and the hardware devices used. Contrast TCP and UDP transport.

For each of the following protocols: describe its purpose, state the protocol stack layer
it uses, and identify commands or tools that use the protocol: HTTP(S), DNS, DHCP, SSH, RDP, SMB,
SSL/TLS, TCP, UDP, ICMP, ARP. Relate ports, services, and protocols.

Describe the Domain Name System (DNS) and security issues with name resolution.

Appropriately use these commands and tools and explain their output: ipconfig/ifconfig,
netstat, arp, ping, traceroute, nmap, nslookup, netcat. Interpret their output to deduce information
about network hosts, topology and services, and to construct a physical wired network and an
encrypted wireless network, both connected to a simple internet.

Describe the purpose of encryption on a wireless network, and compare WEP, WPA, WPA2.

Security Tools

Firewalls

Design an access control list (ACL) for an idealized router to achieve a desired offering of services.

Relate use of a firewall to the pillars of IA.

Describe a firewall's role in implementing decisions concerning tradeoffs between service and security.

Authentication and Cryptography

Describe and contrast symmetric encryption, asymmetric encryption and hashing and explain
their roles in protecting the Pillars of IA.

Describe and contrast key management for symmetric and asymmetric encryption.

Explain the workings of attacks such as frequency analysis, chosen plaintext, and man-in-the-middle.

Describe the purpose of Public Key Infrastructure (PKI) and how it works; relate PKI to
man-in-the-middle attacks.

Obtain an X.509 Certificate from a Certificate Authority. Explain the guarantee that comes
with a valid certificate, describe reasons a certificate may be invalid, and how user actions
with respect to certificates can affect security.

Cyber Operations

Digital Computer Forensics

For a given activity, state the forensic evidence it leaves behind and where it can be found.